1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
DanielleElmas [232]
3 years ago
8

What game is this? help mee?

Computers and Technology
2 answers:
Zielflug [23.3K]3 years ago
3 0

Answer:

where is the picture???

Explanation:

puteri [66]3 years ago
3 0

Answer:

nooooooo

Explanation:

You might be interested in
Assume that success is a variable of type boolean that has been declared. Assume that processor refers to an object that provide
Iteru [2.4K]
Try {
AutoFactory.shutdown();
} catch (ProductionInProgressException e) {
AutoFactory.reset();
}
6 0
3 years ago
Gary says, "Ports are where data enter a network before reaching a gateway. The data travel via transmission
m_a_m_a [10]

The correct explanation of why Gary is wrong is that Ports are where connectors attach to destinations, not where data enter the network.

<h3>What is a port?</h3>

A port is physical part of the computer system where the external devices are connected using cables.

Therefore, it serves as an interface between the motherboard and an external device of the computer.

From Gary statement about ports, he is wrong because, Ports are where connectors attach to destinations, not where data enter the network.

Learn more about ports here:

brainly.com/question/4804932

#SPJ1

3 0
2 years ago
Um?<br><br> i went to check my questions and i found this-
asambeis [7]

Answer:

just go ahead and refresh the page

Explanation:

5 0
2 years ago
Question A low level distributed denial of service (DDoS) attack that involves SYN or SYN/ACK flooding describes what type of at
Morgarella [4.7K]

Answer:

TCP SYN flood

Explanation:

TCP SYN flood (a.k.a. SYN flood) is a type of Distributed Denial of Service (DDoS) attack that exploits part of the normal TCP three-way handshake to consume resources on the targeted server and render it unresponsive.

8 0
2 years ago
When a web page author includes meta keywords, like sex, that have little to do with the information on the page, the author is
OLga [1]
This practice is known as "ClickBait".
8 0
3 years ago
Other questions:
  • Before starting a spreadsheet, it is smarter to plan ahead and think through the design. true or false
    13·1 answer
  • Which of the following correctly describes the reason for quality customer service?
    15·2 answers
  • Create a loop that will output all the multiples of 5 that are greater than zero and less than 60 (do not include 60). 5, 10, 15
    10·1 answer
  • David owns a retail business that just implemented a web app to supplement sales. He needs to choose an attribution partner to i
    15·1 answer
  • LeonRoyal15 if anyone plays fortnite
    10·2 answers
  • The purpose of a software design is to enable programmers to implement the requirements by designating the projected parts of th
    14·1 answer
  • Which of these statements about tags is false?
    12·1 answer
  • Choose the best answer from the drop-down menu. A ______ allows multiple connections to a single signal. Without a ______, conne
    7·2 answers
  • Which option correctly identifies if the researcher’s approach was the best choice in the following scenario and explains why?
    10·2 answers
  • Define management styles
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!